IOC Report
tAa6xNsucX.exe

loading gif

Files

File Path
Type
Category
Malicious
tAa6xNsucX.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\HIIEBAFCBK.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAFIJKKEHJDHJKFIECAAKFIJJK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\AFCFHDHIIIECBGCAKFIJ
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\CBKJJJDHDGDAAKECAKJDAEGCBK
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\CFCBFBGDBKJKECAAKKFHDBFHII
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\DGDBFBFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\EGCFHDAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FBGHCGCAEBFIJKFIDBGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FHDAEHDAKECGCAKFCFIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FIIEGDBAEBFIIDHJJJEBAAAKJE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explortu.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\tAa6xNsucX.exe
"C:\Users\user\Desktop\tAa6xNsucX.exe"
malicious
C:\Users\user\AppData\Local\Temp\HIIEBAFCBK.exe
"C:\Users\user\AppData\Local\Temp\HIIEBAFCBK.exe"
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
"C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe"
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\HIIEBAFCBK.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\HCAAEGIJKE.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://77.91.77.81/cost/go.exe
unknown
malicious
http://147.45.47.155/ku4Nor9/index.php
147.45.47.155
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://77.91.77.81/mine/amadka.exephprefoxox
unknown
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://77.91.77.81/mine/amadka.exera
unknown
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://77.91.77.81/mine/amadka.exe00
unknown
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://77.91.77.81/cost/go.exepData
unknown
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
http://77.91.77.81/cost/go.exe00
unknown
malicious
85.28.47.4/920475a59bac849d.php
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://85.28.47.4/69934896f997d5bb/msvcp140.dll/O
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://85.28.47.4/69934896f997d5bb/msvcp140.dllNLu
unknown
http://147.45.47.155/I
unknown
http://www.sqlite.org/copyright.html.
unknown
http://147.45.47.155/ku4Nor9/index.phpm32
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
http://147.45.47.155/ku4Nor9/index.phpo
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://147.45.47.155/ku4Nor9/index.phpM32
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://147.45.47.155/ku4Nor9/index.phpD
unknown
http://147.45.47.155/ku4Nor9/index.phpE
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
http://85.28.47.4/69934896f997d5bb/softokn3.dll#L
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
http://85.28.47.4/69934896f997d5bb/mozglue.dll0L
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://147.45.47.155/ku4Nor9/index.phpO
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 45 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
147.45.47.155
unknown
Russian Federation
malicious
85.28.47.4
unknown
Russian Federation
malicious
77.91.77.81
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
321000
unkown
page execute and read and write
malicious
4920000
direct allocation
page read and write
malicious
4F40000
direct allocation
page read and write
malicious
321000
unkown
page execute and read and write
malicious
321000
unkown
page execute and read and write
malicious
7D5000
heap
page read and write
malicious
4C00000
direct allocation
page read and write
malicious
4B00000
direct allocation
page read and write
malicious
321000
unkown
page execute and read and write
malicious
5140000
direct allocation
page read and write
malicious
321000
unkown
page execute and read and write
malicious
321000
unkown
page execute and read and write
malicious
C81000
unkown
page execute and read and write
malicious
BF1000
unkown
page execute and read and write
malicious
4B10000
direct allocation
page read and write
malicious
4F40000
direct allocation
page read and write
malicious
3D6F000
stack
page read and write
4C70000
direct allocation
page execute and read and write
1CBF0000
heap
page read and write
542D000
stack
page read and write
B04000
heap
page read and write
D74000
heap
page read and write
D80000
heap
page read and write
D94000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
636000
unkown
page execute and write copy
45FE000
stack
page read and write
2EEE000
stack
page read and write
B04000
heap
page read and write
435F000
stack
page read and write
4AC1000
heap
page read and write
12C4000
heap
page read and write
1144000
heap
page read and write
2F085000
heap
page read and write
35CDC000
stack
page read and write
511000
unkown
page execute and read and write
22DB8000
heap
page read and write
50A0000
direct allocation
page execute and read and write
7000000
heap
page read and write
34FE000
stack
page read and write
406E000
stack
page read and write
4AC1000
heap
page read and write
4D80000
direct allocation
page execute and read and write
4D80000
direct allocation
page execute and read and write
2CCE000
stack
page read and write
4AC1000
heap
page read and write
7D5000
unkown
page execute and read and write
620000
unkown
page execute and read and write
22DB7000
heap
page read and write
D90000
heap
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
50C0000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
41FE000
stack
page read and write
4D00000
direct allocation
page execute and read and write
6C590000
unkown
page read and write
14B3000
heap
page read and write
3C2F000
stack
page read and write
4AC1000
heap
page read and write
22DD1000
heap
page read and write
AF0000
direct allocation
page read and write
259E000
stack
page read and write
4AA0000
heap
page read and write
50A0000
direct allocation
page execute and read and write
321E000
stack
page read and write
421F000
stack
page read and write
672F000
stack
page read and write
53B0000
heap
page read and write
43FE000
stack
page read and write
AF0000
direct allocation
page read and write
4AC1000
heap
page read and write
12C4000
heap
page read and write
2C80000
direct allocation
page read and write
914000
heap
page read and write
4AA1000
heap
page read and write
28CE000
stack
page read and write
1144000
heap
page read and write
4B7E000
stack
page read and write
4BF0000
direct allocation
page read and write
2F093000
heap
page read and write
3C8F000
stack
page read and write
4AC1000
heap
page read and write
404F000
stack
page read and write
638E000
stack
page read and write
14D0000
heap
page read and write
2C80000
direct allocation
page read and write
2F0E000
stack
page read and write
38BE000
stack
page read and write
4AC1000
heap
page read and write
4C60000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
2C6E000
stack
page read and write
EA0000
direct allocation
page read and write
4C80000
heap
page read and write
AF0000
direct allocation
page read and write
4AC1000
heap
page read and write
316E000
stack
page read and write
EA0000
direct allocation
page read and write
25A0000
direct allocation
page execute and read and write
345F000
stack
page read and write
3C6E000
stack
page read and write
41DF000
stack
page read and write
387000
unkown
page read and write
4AC1000
heap
page read and write
D74000
heap
page read and write
4AA1000
heap
page read and write
4C90000
direct allocation
page read and write
22DC0000
heap
page read and write
859000
heap
page read and write
4CA0000
heap
page read and write
2950000
direct allocation
page read and write
36BF000
stack
page read and write
C80000
heap
page read and write
859C000
stack
page read and write
B04000
heap
page read and write
3D5E000
stack
page read and write
12C4000
heap
page read and write
4A60000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
5100000
direct allocation
page execute and read and write
7D7000
unkown
page execute and write copy
4691000
heap
page read and write
3B2F000
stack
page read and write
96C000
stack
page read and write
2C80000
direct allocation
page read and write
5130000
direct allocation
page execute and read and write
22DBB000
heap
page read and write
D94000
heap
page read and write
34EF000
stack
page read and write
22DDF000
heap
page read and write
EC0000
heap
page read and write
BE0000
heap
page read and write
3DAE000
stack
page read and write
2A5F000
stack
page read and write
B04000
heap
page read and write
61EB4000
direct allocation
page read and write
42EE000
stack
page read and write
4B6F000
direct allocation
page read and write
423E000
stack
page read and write
8CB000
heap
page read and write
636000
unkown
page execute and write copy
50A0000
direct allocation
page execute and read and write
1334000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
4770000
trusted library allocation
page read and write
4C5F000
direct allocation
page read and write
1334000
heap
page read and write
D01000
heap
page read and write
8C7000
heap
page read and write
CC0000
heap
page read and write
B04000
heap
page read and write
2987000
heap
page read and write
4AC1000
heap
page read and write
E0C000
heap
page read and write
312F000
stack
page read and write
5100000
direct allocation
page execute and read and write
D84000
heap
page read and write
3E1F000
stack
page read and write
5140000
direct allocation
page execute and read and write
3BDE000
stack
page read and write
EA0000
direct allocation
page read and write
22DBE000
heap
page read and write
4AC1000
heap
page read and write
30BF000
stack
page read and write
511000
unkown
page execute and read and write
B04000
heap
page read and write
22DB8000
heap
page read and write
3350000
heap
page read and write
1144000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
22DD6000
heap
page read and write
50B0000
direct allocation
page execute and read and write
1C3EE000
stack
page read and write
53AC000
stack
page read and write
D80000
heap
page read and write
4AC1000
heap
page read and write
22DB4000
heap
page read and write
449F000
stack
page read and write
35FF000
stack
page read and write
52C0000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
2AEF000
stack
page read and write
843000
heap
page read and write
C60000
direct allocation
page read and write
304E000
stack
page read and write
14D8000
heap
page read and write
487E000
stack
page read and write
22DB8000
heap
page read and write
B04000
heap
page read and write
4E10000
direct allocation
page execute and read and write
6426000
heap
page read and write
6C595000
unkown
page readonly
2950000
direct allocation
page read and write
BD0000
heap
page read and write
1144000
heap
page read and write
12C4000
heap
page read and write
C0C000
unkown
page execute and write copy
C8A000
heap
page read and write
350F000
stack
page read and write
DFB000
heap
page read and write
4C90000
direct allocation
page read and write
42AF000
stack
page read and write
378F000
stack
page read and write
4AC1000
heap
page read and write
C80000
unkown
page readonly
6EFE000
stack
page read and write
D74000
heap
page read and write
5360000
direct allocation
page execute and read and write
300F000
stack
page read and write
4AC1000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
3EAF000
stack
page read and write
12C4000
heap
page read and write
319F000
stack
page read and write
B04000
heap
page read and write
4C7F000
stack
page read and write
D74000
heap
page read and write
377E000
stack
page read and write
5F5000
unkown
page execute and read and write
4BF0000
direct allocation
page read and write
B04000
heap
page read and write
321000
unkown
page execute and write copy
497F000
direct allocation
page read and write
15BE000
unkown
page execute and read and write
636000
unkown
page execute and write copy
2C70000
heap
page read and write
DD0000
direct allocation
page read and write
321000
unkown
page execute and write copy
A7C000
stack
page read and write
D94000
heap
page read and write
18C000
stack
page read and write
476F000
stack
page read and write
B04000
heap
page read and write
12C4000
heap
page read and write
14B3000
heap
page read and write
AF0000
direct allocation
page read and write
22DDC000
heap
page read and write
12C4000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
14B0000
heap
page read and write
1440000
heap
page read and write
12C4000
heap
page read and write
418F000
stack
page read and write
10CF000
stack
page read and write
B04000
heap
page read and write
C38000
unkown
page execute and read and write
6420000
heap
page read and write
435E000
stack
page read and write
BD0000
direct allocation
page execute and read and write
DD0000
direct allocation
page read and write
4AC1000
heap
page read and write
4AC1000
heap
page read and write
41CE000
stack
page read and write
4F9F000
direct allocation
page read and write
C81000
unkown
page execute and write copy
4C90000
direct allocation
page execute and read and write
52C0000
direct allocation
page execute and read and write
3FBE000
stack
page read and write
433F000
stack
page read and write
31FE000
stack
page read and write
657000
heap
page read and write
12B0000
direct allocation
page read and write
B04000
heap
page read and write
4AC1000
heap
page read and write
39BF000
stack
page read and write
387000
unkown
page write copy
40FE000
stack
page read and write
22DDE000
heap
page read and write
39EE000
stack
page read and write
7D5000
unkown
page execute and read and write
40BF000
stack
page read and write
895C000
heap
page read and write
354E000
stack
page read and write
14A6000
heap
page read and write
507F000
stack
page read and write
4AC1000
heap
page read and write
12C4000
heap
page read and write
1144000
heap
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
50A0000
direct allocation
page execute and read and write
C7E000
stack
page read and write
382E000
stack
page read and write
B04000
heap
page read and write
ED0000
heap
page read and write
C96000
unkown
page execute and read and write
4691000
heap
page read and write
40DE000
stack
page read and write
5F5000
unkown
page execute and read and write
499E000
stack
page read and write
467E000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
B04000
heap
page read and write
40DF000
stack
page read and write
50F0000
direct allocation
page execute and read and write
22DD0000
heap
page read and write
4AC1000
heap
page read and write
3980000
heap
page read and write
2D6E000
stack
page read and write
320000
unkown
page read and write
2C80000
direct allocation
page read and write
34E0000
heap
page read and write
4AC1000
heap
page read and write
628000
unkown
page execute and read and write
389000
unkown
page execute and read and write
6C39E000
unkown
page read and write
D74000
heap
page read and write
2C2F000
stack
page read and write
E2C000
unkown
page execute and write copy
1334000
heap
page read and write
2950000
direct allocation
page read and write
893C000
stack
page read and write
D84000
heap
page read and write
4BC0000
trusted library allocation
page read and write
3E5F000
stack
page read and write
B04000
heap
page read and write
36FE000
stack
page read and write
1310000
heap
page read and write
4AF0000
direct allocation
page read and write
403E000
stack
page read and write
4C90000
direct allocation
page read and write
3EEF000
stack
page read and write
80C000
heap
page read and write
2EB0000
heap
page read and write
12B0000
direct allocation
page read and write
61ED0000
direct allocation
page read and write
B04000
heap
page read and write
4AD1000
heap
page read and write
516D000
stack
page read and write
4AC1000
heap
page read and write
3E7E000
stack
page read and write
15BF000
stack
page read and write
4AC1000
heap
page read and write
389000
unkown
page execute and read and write
B04000
heap
page read and write
BC0000
heap
page read and write
387000
unkown
page write copy
4AC1000
heap
page read and write
139E000
stack
page read and write
31DE000
stack
page read and write
4AC1000
heap
page read and write
D94000
heap
page read and write
1334000
heap
page read and write
321000
unkown
page execute and write copy
4AC1000
heap
page read and write
4F30000
direct allocation
page read and write
402E000
stack
page read and write
13C0000
heap
page read and write
22DC0000
heap
page read and write
14A7000
heap
page read and write
B04000
heap
page read and write
D94000
heap
page read and write
454F000
stack
page read and write
4A3E000
stack
page read and write
5140000
direct allocation
page execute and read and write
EA0000
direct allocation
page read and write
3A4E000
stack
page read and write
291F000
stack
page read and write
B04000
heap
page read and write
25DD000
heap
page read and write
4670000
heap
page read and write
AF0000
direct allocation
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
13BE000
stack
page read and write
4AC1000
heap
page read and write
123E000
stack
page read and write
2EBF000
stack
page read and write
1334000
heap
page read and write
4D20000
direct allocation
page execute and read and write
363E000
stack
page read and write
EA0000
direct allocation
page read and write
899000
heap
page read and write
2950000
direct allocation
page read and write
637000
unkown
page execute and write copy
650000
heap
page read and write
4AC1000
heap
page read and write
148F000
heap
page read and write
290E000
stack
page read and write
841000
heap
page read and write
4AC1000
heap
page read and write
3A7F000
stack
page read and write
2C80000
direct allocation
page read and write
B30000
heap
page read and write
12C4000
heap
page read and write
387000
unkown
page read and write
137E000
stack
page read and write
4C90000
direct allocation
page read and write
849B000
stack
page read and write
373F000
stack
page read and write
4A80000
direct allocation
page execute and read and write
22DBB000
heap
page read and write
3B6E000
stack
page read and write
3611D000
stack
page read and write
477F000
stack
page read and write
50C0000
direct allocation
page execute and read and write
8B4000
heap
page read and write
314F000
stack
page read and write
4AC1000
heap
page read and write
336F000
stack
page read and write
3DAF000
stack
page read and write
7BA000
heap
page read and write
D50000
heap
page read and write
1144000
heap
page read and write
600000
heap
page read and write
43EE000
stack
page read and write
4A60000
direct allocation
page execute and read and write
636000
unkown
page execute and read and write
CAC000
stack
page read and write
459F000
stack
page read and write
369F000
stack
page read and write
5F5000
unkown
page execute and read and write
4AE0000
direct allocation
page execute and read and write
640E000
stack
page read and write
EA0000
direct allocation
page read and write
B04000
heap
page read and write
D84000
heap
page read and write
2CDF000
stack
page read and write
2B2E000
stack
page read and write
3D1E000
stack
page read and write
5F5000
unkown
page execute and read and write
14A6000
heap
page read and write
44A1000
heap
page read and write
22DD7000
heap
page read and write
AFA000
stack
page read and write
3534000
direct allocation
page execute and read and write
AF0000
direct allocation
page read and write
61EB7000
direct allocation
page readonly
22DBD000
heap
page read and write
2950000
direct allocation
page read and write
4AC1000
heap
page read and write
22DB8000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
61ED4000
direct allocation
page readonly
B04000
heap
page read and write
1CBF1000
heap
page read and write
389000
unkown
page execute and read and write
44EF000
stack
page read and write
7D7000
unkown
page execute and write copy
364F000
stack
page read and write
22DDA000
heap
page read and write
B04000
heap
page read and write
839000
heap
page read and write
13FE000
heap
page read and write
4CA1000
heap
page read and write
636000
unkown
page execute and write copy
38CF000
stack
page read and write
1144000
heap
page read and write
F97000
unkown
page execute and write copy
22DB3000
heap
page read and write
5120000
direct allocation
page execute and read and write
52D0000
direct allocation
page execute and read and write
B04000
heap
page read and write
4D80000
direct allocation
page execute and read and write
12C4000
heap
page read and write
4A5F000
stack
page read and write
D7E000
stack
page read and write
456E000
stack
page read and write
B04000
heap
page read and write
820000
heap
page read and write
445F000
stack
page read and write
45DE000
stack
page read and write
B04000
heap
page read and write
2C80000
direct allocation
page read and write
4C80000
direct allocation
page execute and read and write
682F000
stack
page read and write
D74000
heap
page read and write
33EE000
stack
page read and write
4AC1000
heap
page read and write
AF0000
direct allocation
page read and write
5350000
direct allocation
page execute and read and write
411E000
stack
page read and write
2980000
heap
page read and write
D94000
heap
page read and write
4671000
heap
page read and write
B04000
heap
page read and write
2950000
direct allocation
page read and write
31DF000
stack
page read and write
B04000
heap
page read and write
7D7000
unkown
page execute and write copy
4CA0000
direct allocation
page execute and read and write
37E3000
heap
page read and write
1CBF1000
heap
page read and write
B04000
heap
page read and write
EA0000
direct allocation
page read and write
305F000
stack
page read and write
B04000
heap
page read and write
2C80000
direct allocation
page read and write
82A000
heap
page read and write
1334000
heap
page read and write
849000
heap
page read and write
12C4000
heap
page read and write
3E5E000
stack
page read and write
48FE000
stack
page read and write
49BE000
stack
page read and write
45BF000
stack
page read and write
466E000
stack
page read and write
22DB3000
heap
page read and write
2B8F000
stack
page read and write
462F000
stack
page read and write
12C4000
heap
page read and write
4AC1000
heap
page read and write
3FFF000
stack
page read and write
3F9F000
stack
page read and write
28D000
stack
page read and write
96D000
heap
page read and write
D74000
heap
page read and write
2CDE000
stack
page read and write
1334000
heap
page read and write
326E000
stack
page read and write
4671000
heap
page read and write
2DCE000
stack
page read and write
320000
unkown
page readonly
353E000
direct allocation
page execute and read and write
52C0000
direct allocation
page execute and read and write
391D000
stack
page read and write
637000
unkown
page execute and write copy
AF0000
direct allocation
page read and write
22DDF000
heap
page read and write
380000
unkown
page execute and read and write
3A9E000
stack
page read and write
2C97000
heap
page read and write
3CAE000
stack
page read and write
CE6000
heap
page read and write
4770000
heap
page read and write
4AC1000
heap
page read and write
37DE000
stack
page read and write
322F000
stack
page read and write
309F000
stack
page read and write
320000
unkown
page readonly
5120000
direct allocation
page execute and read and write
35BE000
stack
page read and write
7D5000
unkown
page execute and read and write
50E0000
direct allocation
page execute and read and write
3A0F000
stack
page read and write
4BF0000
direct allocation
page read and write
5340000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
35EF000
stack
page read and write
44B3000
heap
page read and write
2A27000
heap
page read and write
2FBF000
stack
page read and write
4AC1000
heap
page read and write
14A0000
heap
page read and write
7D7000
unkown
page execute and write copy
385E000
stack
page read and write
511F000
stack
page read and write
380000
unkown
page execute and read and write
4A60000
direct allocation
page execute and read and write
8D0000
heap
page read and write
4D20000
direct allocation
page execute and read and write
32CE000
stack
page read and write
CE9000
unkown
page execute and read and write
B04000
heap
page read and write
B04000
heap
page read and write
E27000
unkown
page execute and write copy
2C80000
direct allocation
page read and write
345E000
stack
page read and write
B04000
heap
page read and write
4AC1000
heap
page read and write
387000
unkown
page read and write
620000
unkown
page execute and read and write
637000
unkown
page execute and write copy
22DDF000
heap
page read and write
B04000
heap
page read and write
5290000
direct allocation
page execute and read and write
148F000
heap
page read and write
5090000
direct allocation
page execute and read and write
10BF000
stack
page read and write
3D7F000
stack
page read and write
DD0000
direct allocation
page read and write
8B6000
heap
page read and write
22DA6000
heap
page read and write
12B0000
direct allocation
page read and write
12B0000
direct allocation
page read and write
86DF000
stack
page read and write
F96000
unkown
page execute and write copy
320000
unkown
page read and write
3B4F000
stack
page read and write
6C58F000
unkown
page write copy
B04000
heap
page read and write
321000
unkown
page execute and write copy
50C0000
direct allocation
page execute and read and write
43AF000
stack
page read and write
3F4E000
stack
page read and write
B04000
heap
page read and write
1144000
heap
page read and write
AF0000
direct allocation
page read and write
50D0000
direct allocation
page execute and read and write
22DC5000
heap
page read and write
6850000
heap
page read and write
850000
heap
page read and write
380000
unkown
page execute and read and write
22DB4000
heap
page read and write
7010000
heap
page read and write
4AC1000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
8958000
heap
page read and write
DD0000
direct allocation
page read and write
D22000
heap
page read and write
B04000
heap
page read and write
2FAF000
stack
page read and write
DD0000
direct allocation
page read and write
511000
unkown
page execute and read and write
12B0000
direct allocation
page read and write
C50000
heap
page read and write
8940000
heap
page read and write
386F000
stack
page read and write
6425000
heap
page read and write
2F9E000
stack
page read and write
2D2F000
stack
page read and write
3534000
direct allocation
page execute and read and write
AE0000
heap
page read and write
3F0F000
stack
page read and write
7D5000
unkown
page execute and read and write
D74000
heap
page read and write
6C3A2000
unkown
page readonly
4A60000
direct allocation
page execute and read and write
B04000
heap
page read and write
38EE000
stack
page read and write
D74000
heap
page read and write
B04000
heap
page read and write
D4E000
stack
page read and write
3B3E000
stack
page read and write
DD0000
direct allocation
page read and write
19B000
stack
page read and write
B04000
heap
page read and write
4AC1000
heap
page read and write
511000
unkown
page execute and read and write
10AF000
stack
page read and write
C4E000
stack
page read and write
320000
unkown
page readonly
12B0000
direct allocation
page read and write
442E000
stack
page read and write
32CE000
stack
page read and write
507F000
stack
page read and write
35F1B000
stack
page read and write
12C4000
heap
page read and write
4691000
heap
page read and write
552E000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
B04000
heap
page read and write
2D6F000
stack
page read and write
4AC1000
heap
page read and write
22DD1000
heap
page read and write
4AC1000
heap
page read and write
321000
unkown
page execute and write copy
341F000
stack
page read and write
2DB0000
heap
page read and write
320000
unkown
page readonly
883C000
stack
page read and write
387000
unkown
page write copy
4E00000
direct allocation
page execute and read and write
B04000
heap
page read and write
3E0E000
stack
page read and write
1144000
heap
page read and write
3A2E000
stack
page read and write
3524000
direct allocation
page execute and read and write
33CF000
stack
page read and write
2F5E000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
D84000
heap
page read and write
22DA6000
heap
page read and write
22DBE000
heap
page read and write
37BE000
stack
page read and write
B04000
heap
page read and write
144E000
heap
page read and write
22DA5000
heap
page read and write
4AC1000
heap
page read and write
F76000
unkown
page execute and read and write
12B0000
direct allocation
page read and write
37E0000
heap
page read and write
30EF000
stack
page read and write
D84000
heap
page read and write
466F000
stack
page read and write
50C0000
direct allocation
page execute and read and write
4DC0000
direct allocation
page execute and read and write
3CFF000
stack
page read and write
29EC000
stack
page read and write
3C7E000
stack
page read and write
B04000
heap
page read and write
1137000
unkown
page execute and write copy
412F000
stack
page read and write
387D000
stack
page read and write
2950000
direct allocation
page read and write
22DDF000
heap
page read and write
8B2000
heap
page read and write
2970000
direct allocation
page read and write
3CDF000
stack
page read and write
343F000
stack
page read and write
52A0000
direct allocation
page execute and read and write
144F000
heap
page read and write
29DB000
stack
page read and write
2EDEE000
stack
page read and write
380000
unkown
page execute and read and write
50A0000
direct allocation
page execute and read and write
D84000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
46DF000
stack
page read and write
2950000
direct allocation
page read and write
F96000
unkown
page execute and read and write
945000
heap
page read and write
3534000
direct allocation
page execute and read and write
D84000
heap
page read and write
146A000
heap
page read and write
3990000
heap
page read and write
CBA000
heap
page read and write
14B3000
heap
page read and write
4DA0000
trusted library allocation
page read and write
EA0000
direct allocation
page read and write
4AC1000
heap
page read and write
4B5F000
direct allocation
page read and write
D84000
heap
page read and write
281C000
stack
page read and write
4AC1000
heap
page read and write
1334000
heap
page read and write
5160000
direct allocation
page execute and read and write
321000
unkown
page execute and write copy
2ECF000
stack
page read and write
B04000
heap
page read and write
12C4000
heap
page read and write
14CE000
heap
page read and write
2D4E000
stack
page read and write
4CB0000
direct allocation
page execute and read and write
4F30000
direct allocation
page read and write
468F000
stack
page read and write
312E000
stack
page read and write
2D1E000
stack
page read and write
3BDE000
stack
page read and write
B7D000
stack
page read and write
50C0000
direct allocation
page execute and read and write
22DB8000
heap
page read and write
C14000
unkown
page execute and write copy
14C7000
heap
page read and write
B04000
heap
page read and write
409F000
stack
page read and write
2A20000
heap
page read and write
B04000
heap
page read and write
BF1000
unkown
page execute and write copy
2C8F000
stack
page read and write
2B2F000
stack
page read and write
3B8E000
stack
page read and write
B04000
heap
page read and write
4AC1000
heap
page read and write
52E0000
direct allocation
page execute and read and write
4D3F000
stack
page read and write
3AEF000
stack
page read and write
4AC1000
heap
page read and write
DF0000
heap
page read and write
4AC1000
heap
page read and write
44FF000
stack
page read and write
EC7000
heap
page read and write
22DC0000
heap
page read and write
12C4000
heap
page read and write
B04000
heap
page read and write
D94000
heap
page read and write
2A1E000
stack
page read and write
4F9F000
direct allocation
page read and write
501E000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
471E000
stack
page read and write
485E000
stack
page read and write
B04000
heap
page read and write
4E8E000
stack
page read and write
50F0000
direct allocation
page execute and read and write
83E000
heap
page read and write
2970000
direct allocation
page read and write
CE7000
unkown
page write copy
12C4000
heap
page read and write
3330000
heap
page read and write
6C3B0000
unkown
page readonly
22DC0000
heap
page read and write
14B3000
heap
page read and write
F5C000
unkown
page execute and read and write
EA0000
direct allocation
page read and write
4AC1000
heap
page read and write
F55000
unkown
page execute and read and write
22DD1000
heap
page read and write
323F000
stack
page read and write
4CA1000
heap
page read and write
7D5000
unkown
page execute and read and write
372F000
stack
page read and write
7D5000
unkown
page execute and read and write
6C310000
unkown
page readonly
61ED3000
direct allocation
page read and write
328F000
stack
page read and write
B04000
heap
page read and write
5F5000
unkown
page execute and read and write
146B000
heap
page read and write
620000
unkown
page execute and read and write
5F8000
stack
page read and write
ED8000
heap
page read and write
5150000
direct allocation
page execute and read and write
2FFC000
stack
page read and write
4AC1000
heap
page read and write
5F5000
unkown
page execute and read and write
4A90000
direct allocation
page execute and read and write
7B0000
heap
page read and write
D3A000
unkown
page execute and read and write
4AC1000
heap
page read and write
4AC1000
heap
page read and write
9D0000
heap
page read and write
4AC1000
heap
page read and write
13FA000
heap
page read and write
3C3F000
stack
page read and write
4C90000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
3F5F000
stack
page read and write
149F000
stack
page read and write
22D0A000
heap
page read and write
12C4000
heap
page read and write
2950000
direct allocation
page read and write
399E000
stack
page read and write
4B00000
direct allocation
page execute and read and write
387000
unkown
page write copy
318E000
stack
page read and write
EA0000
direct allocation
page read and write
52F0000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
4AC1000
heap
page read and write
333E000
stack
page read and write
4D10000
direct allocation
page execute and read and write
B04000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4AA0000
direct allocation
page execute and read and write
13CB000
heap
page read and write
4F7E000
stack
page read and write
636000
unkown
page execute and read and write
B04000
heap
page read and write
22DB1000
heap
page read and write
12C4000
heap
page read and write
2D8F000
stack
page read and write
320000
unkown
page readonly
4C90000
direct allocation
page read and write
4AC1000
heap
page read and write
2B9F000
stack
page read and write
B04000
heap
page read and write
61ECC000
direct allocation
page read and write
3D1F000
stack
page read and write
416F000
stack
page read and write
1CCFB000
heap
page read and write
C8B000
heap
page read and write
4AC1000
heap
page read and write
C80000
heap
page read and write
29AF000
stack
page read and write
5130000
direct allocation
page read and write
85DE000
stack
page read and write
637000
unkown
page execute and write copy
355F000
stack
page read and write
14C6000
heap
page read and write
1334000
heap
page read and write
4AC1000
heap
page read and write
4AC1000
heap
page read and write
D84000
heap
page read and write
402F000
stack
page read and write
620000
unkown
page execute and read and write
383E000
stack
page read and write
4C80000
direct allocation
page execute and read and write
4D60000
direct allocation
page execute and read and write
387000
unkown
page read and write
B04000
heap
page read and write
D74000
heap
page read and write
655000
heap
page read and write
135F000
stack
page read and write
50A0000
direct allocation
page execute and read and write
D94000
heap
page read and write
B04000
heap
page read and write
4AC1000
heap
page read and write
22DD6000
heap
page read and write
331E000
stack
page read and write
7010000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
511000
unkown
page execute and read and write
4C90000
direct allocation
page execute and read and write
449E000
stack
page read and write
4AC1000
heap
page read and write
1144000
heap
page read and write
389000
unkown
page execute and read and write
2EAF000
stack
page read and write
4AC1000
heap
page read and write
2950000
direct allocation
page read and write
452F000
stack
page read and write
8BE000
heap
page read and write
657000
heap
page read and write
B00000
heap
page read and write
517E000
stack
page read and write
4AF0000
direct allocation
page read and write
4AC1000
heap
page read and write
12C4000
heap
page read and write
2E1C000
stack
page read and write
511000
unkown
page execute and read and write
4AC1000
heap
page read and write
5130000
direct allocation
page execute and read and write
4A60000
direct allocation
page execute and read and write
42AE000
stack
page read and write
144F000
heap
page read and write
C60000
direct allocation
page read and write
620000
unkown
page execute and read and write
B04000
heap
page read and write
4C80000
direct allocation
page execute and read and write
2C90000
heap
page read and write
2950000
direct allocation
page read and write
395E000
stack
page read and write
440F000
stack
page read and write
12C4000
heap
page read and write
12B0000
direct allocation
page read and write
376F000
stack
page read and write
12C4000
heap
page read and write
14B3000
heap
page read and write
44A1000
heap
page read and write
628000
unkown
page execute and read and write
4AD0000
direct allocation
page execute and read and write
415F000
stack
page read and write
309E000
stack
page read and write
4CA1000
heap
page read and write
294E000
stack
page read and write
4C90000
direct allocation
page execute and read and write
E2C000
unkown
page execute and read and write
13E0000
direct allocation
page read and write
4AC1000
heap
page read and write
DAD000
stack
page read and write
3EBF000
stack
page read and write
D74000
heap
page read and write
377E000
stack
page read and write
44BE000
stack
page read and write
4A60000
direct allocation
page execute and read and write
2C80000
direct allocation
page read and write
362F000
stack
page read and write
33AE000
stack
page read and write
2EFF0000
trusted library allocation
page read and write
4CD0000
direct allocation
page execute and read and write
1144000
heap
page read and write
387000
unkown
page read and write
E27000
unkown
page execute and read and write
5324000
heap
page read and write
13E0000
direct allocation
page read and write
16BF000
stack
page read and write
D94000
heap
page read and write
42CF000
stack
page read and write
4C90000
direct allocation
page read and write
34EE000
stack
page read and write
B04000
heap
page read and write
636000
unkown
page execute and read and write
3534000
direct allocation
page execute and read and write
320000
unkown
page readonly
1334000
heap
page read and write
2D8E000
stack
page read and write
3A9F000
stack
page read and write
50D0000
direct allocation
page execute and read and write
C10000
heap
page read and write
389000
unkown
page execute and read and write
DD0000
direct allocation
page read and write
4C3E000
stack
page read and write
D90000
heap
page read and write
391F000
stack
page read and write
B04000
heap
page read and write
14B8000
heap
page read and write
2F1F000
stack
page read and write
4F7E000
stack
page read and write
458E000
stack
page read and write
C8E000
heap
page read and write
CE0000
unkown
page execute and read and write
34BF000
stack
page read and write
6C38D000
unkown
page readonly
22DD1000
heap
page read and write
4D10000
direct allocation
page execute and read and write
B04000
heap
page read and write
22DDF000
heap
page read and write
5310000
direct allocation
page execute and read and write
22DDF000
heap
page read and write
2EAE000
stack
page read and write
4AC1000
heap
page read and write
22DC0000
heap
page read and write
1C7ED000
stack
page read and write
4771000
heap
page read and write
2F096000
heap
page read and write
B04000
heap
page read and write
2EB7000
heap
page read and write
5080000
direct allocation
page execute and read and write
366E000
stack
page read and write
2DAE000
stack
page read and write
4D70000
direct allocation
page execute and read and write
5110000
direct allocation
page execute and read and write
620000
unkown
page execute and read and write
14CE000
heap
page read and write
B04000
heap
page read and write
4AC1000
heap
page read and write
380000
unkown
page execute and read and write
B04000
heap
page read and write
C60000
direct allocation
page read and write
5300000
direct allocation
page execute and read and write
14B8000
heap
page read and write
AF0000
direct allocation
page read and write
2BDE000
stack
page read and write
1334000
heap
page read and write
34AF000
stack
page read and write
D0E000
stack
page read and write
4E20000
direct allocation
page execute and read and write
D84000
heap
page read and write
416E000
stack
page read and write
146B000
heap
page read and write
22EA2000
heap
page read and write
EAC000
stack
page read and write
300000
heap
page read and write
35EDC000
stack
page read and write
393F000
stack
page read and write
4690000
heap
page read and write
340E000
stack
page read and write
12B0000
direct allocation
page read and write
22DBA000
heap
page read and write
F80000
unkown
page execute and read and write
44A1000
heap
page read and write
4AC1000
heap
page read and write
F88000
unkown
page execute and read and write
22DD1000
heap
page read and write
B04000
heap
page read and write
1135000
unkown
page execute and read and write
14B7000
heap
page read and write
49FF000
stack
page read and write
12C4000
heap
page read and write
4C50000
direct allocation
page execute and read and write
46FF000
stack
page read and write
4B3F000
stack
page read and write
4C0B000
stack
page read and write
473E000
stack
page read and write
2DB7000
heap
page read and write
22DDF000
heap
page read and write
1C9ED000
stack
page read and write
426F000
stack
page read and write
320000
unkown
page read and write
637000
unkown
page execute and write copy
36DE000
stack
page read and write
1334000
heap
page read and write
D94000
heap
page read and write
50A0000
direct allocation
page execute and read and write
47BE000
stack
page read and write
4AC1000
heap
page read and write
4AC0000
heap
page read and write
B04000
heap
page read and write
7D7000
unkown
page execute and write copy
148F000
heap
page read and write
4771000
heap
page read and write
417E000
stack
page read and write
4AC1000
heap
page read and write
387000
unkown
page write copy
7CB000
stack
page read and write
143C000
heap
page read and write
430E000
stack
page read and write
381E000
stack
page read and write
1CCF0000
trusted library allocation
page read and write
DD0000
direct allocation
page read and write
4C80000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
22C64000
heap
page read and write
B04000
heap
page read and write
F6F000
stack
page read and write
4AC1000
heap
page read and write
44A1000
heap
page read and write
447F000
stack
page read and write
3DEE000
stack
page read and write
4AC1000
heap
page read and write
22DDE000
heap
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
390E000
stack
page read and write
28AE000
stack
page read and write
B04000
heap
page read and write
4B4E000
stack
page read and write
3180000
direct allocation
page execute and read and write
4C90000
direct allocation
page read and write
352E000
stack
page read and write
636000
unkown
page execute and write copy
1144000
heap
page read and write
636000
unkown
page execute and write copy
B04000
heap
page read and write
425E000
stack
page read and write
453E000
stack
page read and write
2D0C000
stack
page read and write
B04000
heap
page read and write
4AC1000
heap
page read and write
359E000
stack
page read and write
D94000
heap
page read and write
30FF000
stack
page read and write
12C4000
heap
page read and write
AF0000
direct allocation
page read and write
12B0000
direct allocation
page read and write
4D00000
direct allocation
page execute and read and write
D84000
heap
page read and write
2C80000
direct allocation
page read and write
50C0000
direct allocation
page execute and read and write
299E000
stack
page read and write
61ECD000
direct allocation
page readonly
101B000
heap
page read and write
25D7000
heap
page read and write
491C000
stack
page read and write
B04000
heap
page read and write
3A5F000
stack
page read and write
22DDC000
heap
page read and write
128E000
stack
page read and write
12C4000
heap
page read and write
30DE000
stack
page read and write
B04000
heap
page read and write
12B0000
direct allocation
page read and write
61E00000
direct allocation
page execute and read and write
12C4000
heap
page read and write
C4F000
stack
page read and write
2C80000
direct allocation
page read and write
3534000
direct allocation
page execute and read and write
4D50000
direct allocation
page execute and read and write
14CE000
heap
page read and write
1010000
heap
page read and write
4F20000
heap
page read and write
22DBE000
heap
page read and write
37CE000
stack
page read and write
44C0000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
44A1000
heap
page read and write
52C0000
direct allocation
page execute and read and write
637000
unkown
page execute and write copy
14AF000
heap
page read and write
4AC1000
heap
page read and write
D94000
heap
page read and write
3523000
direct allocation
page execute and read and write
387000
unkown
page read and write
B04000
heap
page read and write
4C80000
direct allocation
page execute and read and write
313E000
stack
page read and write
387F000
stack
page read and write
48BF000
stack
page read and write
408E000
stack
page read and write
4CC0000
direct allocation
page execute and read and write
4790000
trusted library allocation
page read and write
64D000
stack
page read and write
22DBE000
heap
page read and write
397E000
stack
page read and write
33BE000
stack
page read and write
452E000
stack
page read and write
12C4000
heap
page read and write
14AE000
heap
page read and write
4AC1000
heap
page read and write
12C4000
heap
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
EA0000
direct allocation
page read and write
4AC1000
heap
page read and write
2DDF000
stack
page read and write
628000
unkown
page execute and read and write
326F000
stack
page read and write
3DBE000
stack
page read and write
32E0000
heap
page read and write
395F000
stack
page read and write
2E6F000
stack
page read and write
1334000
heap
page read and write
4D80000
direct allocation
page execute and read and write
5330000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
43BF000
stack
page read and write
7BE000
heap
page read and write
12C4000
heap
page read and write
B04000
heap
page read and write
879000
heap
page read and write
4691000
heap
page read and write
AF0000
direct allocation
page read and write
2970000
direct allocation
page read and write
DD0000
direct allocation
page read and write
8B9000
heap
page read and write
3BFE000
stack
page read and write
2C80000
direct allocation
page read and write
1330000
heap
page read and write
32AE000
stack
page read and write
EA0000
direct allocation
page read and write
347E000
stack
page read and write
413F000
stack
page read and write
3B9F000
stack
page read and write
4C90000
direct allocation
page execute and read and write
D74000
heap
page read and write
B04000
heap
page read and write
D70000
heap
page read and write
288E000
stack
page read and write
421E000
stack
page read and write
B04000
heap
page read and write
2C80000
direct allocation
page read and write
439E000
stack
page read and write
2DA0000
direct allocation
page execute and read and write
13DB000
heap
page read and write
4AC1000
heap
page read and write
44A2000
heap
page read and write
DD0000
direct allocation
page read and write
3FDE000
stack
page read and write
D94000
heap
page read and write
22DBB000
heap
page read and write
7001000
heap
page read and write
3CCE000
stack
page read and write
22DBE000
heap
page read and write
146B000
heap
page read and write
320000
unkown
page read and write
CFD000
stack
page read and write
13E0000
direct allocation
page read and write
12C4000
heap
page read and write
42BD000
stack
page read and write
39FE000
stack
page read and write
B04000
heap
page read and write
6C3B1000
unkown
page execute read
636000
unkown
page execute and read and write
11BF000
stack
page read and write
3EFE000
stack
page read and write
33AF000
stack
page read and write
4C80000
direct allocation
page execute and read and write
B04000
heap
page read and write
6C58E000
unkown
page read and write
4AC1000
heap
page read and write
1475000
heap
page read and write
50E0000
direct allocation
page execute and read and write
4C90000
direct allocation
page read and write
1F0000
heap
page read and write
12C4000
heap
page read and write
4AC1000
heap
page read and write
331F000
stack
page read and write
38BE000
stack
page read and write
FAE000
stack
page read and write
22DBA000
heap
page read and write
526E000
stack
page read and write
495F000
stack
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
E7F000
stack
page read and write
3F9E000
stack
page read and write
389000
unkown
page execute and read and write
4C90000
direct allocation
page read and write
4AC1000
heap
page read and write
22DD1000
heap
page read and write
327E000
stack
page read and write
4AC1000
heap
page read and write
44A0000
heap
page read and write
349E000
stack
page read and write
C80000
unkown
page read and write
E71000
unkown
page execute and read and write
2950000
direct allocation
page read and write
1144000
heap
page read and write
700E000
heap
page read and write
B04000
heap
page read and write
628000
unkown
page execute and read and write
3BBF000
stack
page read and write
4AC1000
heap
page read and write
2C80000
direct allocation
page read and write
337F000
stack
page read and write
1CBED000
stack
page read and write
AF0000
direct allocation
page read and write
50C0000
direct allocation
page execute and read and write
444E000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
497F000
stack
page read and write
373E000
stack
page read and write
628000
unkown
page execute and read and write
6C311000
unkown
page execute read
362E000
stack
page read and write
5320000
direct allocation
page execute and read and write
125E000
stack
page read and write
3FEF000
stack
page read and write
3534000
direct allocation
page execute and read and write
B04000
heap
page read and write
3C6F000
stack
page read and write
D74000
heap
page read and write
4AC1000
heap
page read and write
12C4000
heap
page read and write
4B3E000
stack
page read and write
3534000
direct allocation
page execute and read and write
CBE000
heap
page read and write
4AC1000
heap
page read and write
102C000
heap
page read and write
5130000
direct allocation
page read and write
B04000
heap
page read and write
4C90000
direct allocation
page read and write
943000
heap
page read and write
2950000
direct allocation
page read and write
335E000
stack
page read and write
12B0000
direct allocation
page read and write
4D80000
direct allocation
page execute and read and write
427F000
stack
page read and write
D84000
heap
page read and write
38AF000
stack
page read and write
376E000
stack
page read and write
22DB3000
heap
page read and write
481F000
stack
page read and write
4AC1000
heap
page read and write
1319000
unkown
page execute and read and write
1140000
heap
page read and write
320000
unkown
page read and write
4C90000
direct allocation
page execute and read and write
D84000
heap
page read and write
4C90000
direct allocation
page read and write
636000
unkown
page execute and read and write
33E0000
direct allocation
page execute and read and write
2FBF000
stack
page read and write
371E000
stack
page read and write
3B2E000
stack
page read and write
D94000
heap
page read and write
37FF000
stack
page read and write
76E000
stack
page read and write
4771000
heap
page read and write
527F000
stack
page read and write
387000
unkown
page write copy
22DD1000
heap
page read and write
437E000
stack
page read and write
4AC1000
heap
page read and write
3F5F000
stack
page read and write
D84000
heap
page read and write
32DF000
stack
page read and write
35DE000
stack
page read and write
4AC1000
heap
page read and write
3D3E000
stack
page read and write
2F08E000
heap
page read and write
6FFF000
stack
page read and write
2FEE000
stack
page read and write
4D8E000
stack
page read and write
2E5E000
stack
page read and write
5110000
direct allocation
page execute and read and write
5320000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
27DF000
stack
page read and write
4C90000
direct allocation
page execute and read and write
2950000
direct allocation
page read and write
A6C000
stack
page read and write
61E01000
direct allocation
page execute read
22DD1000
heap
page read and write
2F08D000
heap
page read and write
22DBB000
heap
page read and write
BF0000
unkown
page readonly
1C1EF000
stack
page read and write
368E000
stack
page read and write
332E000
stack
page read and write
EA0000
direct allocation
page read and write
928000
heap
page read and write
380000
unkown
page execute and read and write
3AFF000
stack
page read and write
3530000
direct allocation
page execute and read and write
36DF000
stack
page read and write
25D0000
heap
page read and write
2EAE000
stack
page read and write
22DD1000
heap
page read and write
4AC1000
heap
page read and write
431F000
stack
page read and write
302E000
stack
page read and write
4A70000
direct allocation
page execute and read and write
4D80000
direct allocation
page execute and read and write
22DB6000
heap
page read and write
6C54F000
unkown
page readonly
320000
unkown
page read and write
3F2E000
stack
page read and write
D94000
heap
page read and write
34F0000
direct allocation
page execute and read and write
636000
unkown
page execute and read and write
4AA1000
heap
page read and write
4AC1000
heap
page read and write
3E3F000
stack
page read and write
4AC1000
heap
page read and write
662F000
stack
page read and write
D1B000
heap
page read and write
CE7000
unkown
page read and write
4C4F000
stack
page read and write
43EF000
stack
page read and write
DD0000
direct allocation
page read and write
DD0000
direct allocation
page read and write
B04000
heap
page read and write
37AE000
stack
page read and write
32FF000
stack
page read and write
4771000
heap
page read and write
2F5F000
stack
page read and write
3ABE000
stack
page read and write
22DB4000
heap
page read and write
39AF000
stack
page read and write
B04000
heap
page read and write
1C5EF000
stack
page read and write
B04000
heap
page read and write
4AC1000
heap
page read and write
D74000
heap
page read and write
4671000
heap
page read and write
4ABF000
stack
page read and write
4AC1000
heap
page read and write
4671000
heap
page read and write
1144000
heap
page read and write
353E000
direct allocation
page execute and read and write
1005000
unkown
page execute and read and write
495B000
stack
page read and write
BF0000
unkown
page readonly
4C70000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
B04000
heap
page read and write
22DB6000
heap
page read and write
1BFEF000
stack
page read and write
4D90000
direct allocation
page execute and read and write
45A0000
trusted library allocation
page read and write
628000
unkown
page execute and read and write
32EC000
heap
page read and write
EA0000
direct allocation
page read and write
4C60000
direct allocation
page execute and read and write
25B0000
direct allocation
page execute and read and write
12C0000
heap
page read and write
14AF000
heap
page read and write
63CE000
stack
page read and write
5090000
direct allocation
page execute and read and write
14A6000
heap
page read and write
3EEE000
stack
page read and write
B04000
heap
page read and write
E90000
heap
page read and write
DC0000
heap
page read and write
381F000
stack
page read and write
463F000
stack
page read and write
44A1000
heap
page read and write
1210000
heap
page read and write
B04000
heap
page read and write
146C000
heap
page read and write
39EF000
stack
page read and write
12B0000
direct allocation
page read and write
4AC1000
heap
page read and write
4BA0000
trusted library allocation
page read and write
2F0000
heap
page read and write
1110000
heap
page read and write
12A0000
heap
page read and write
E15000
unkown
page execute and read and write
4AC1000
heap
page read and write
AF0000
direct allocation
page read and write
295E000
stack
page read and write
4D30000
direct allocation
page execute and read and write
4AB0000
direct allocation
page execute and read and write
B04000
heap
page read and write
3E9E000
stack
page read and write
359F000
stack
page read and write
3C1E000
stack
page read and write
4AC1000
heap
page read and write
DD0000
direct allocation
page read and write
1468000
heap
page read and write
52AE000
stack
page read and write
2C2F000
stack
page read and write
22DD6000
heap
page read and write
52C0000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
2EFEF000
stack
page read and write
14AF000
heap
page read and write
1334000
heap
page read and write
22DC0000
heap
page read and write
CF4000
heap
page read and write
B04000
heap
page read and write
483F000
stack
page read and write
B4E000
stack
page read and write
8360000
heap
page read and write
22DD1000
heap
page read and write
B6D000
stack
page read and write
3ADD000
stack
page read and write
4C90000
direct allocation
page read and write
38AE000
stack
page read and write
31BF000
stack
page read and write
BAE000
stack
page read and write
15BB000
unkown
page execute and write copy
25C0000
direct allocation
page execute and read and write
4C90000
direct allocation
page read and write
D74000
heap
page read and write
13CF000
stack
page read and write
83C000
heap
page read and write
4C80000
direct allocation
page execute and read and write
14D8000
heap
page read and write
357F000
stack
page read and write
3F7F000
stack
page read and write
2A8F000
stack
page read and write
4C90000
direct allocation
page read and write
2FEF000
stack
page read and write
3360000
heap
page read and write
4AF0000
direct allocation
page read and write
519F000
direct allocation
page read and write
DD0000
direct allocation
page read and write
4F30000
direct allocation
page read and write
44B0000
heap
page read and write
B04000
heap
page read and write
1144000
heap
page read and write
22DDF000
heap
page read and write
22DA6000
heap
page read and write
50B0000
direct allocation
page execute and read and write
5130000
direct allocation
page read and write
7D7000
unkown
page execute and write copy
15BE000
unkown
page execute and write copy
19DF000
stack
page read and write
44A1000
heap
page read and write
4AC1000
heap
page read and write
D3E000
stack
page read and write
4AC1000
heap
page read and write
12C4000
heap
page read and write
B04000
heap
page read and write
12C4000
heap
page read and write
7EF00000
direct allocation
page execute and read and write
FAD000
stack
page read and write
4870000
trusted library allocation
page read and write
22DBF000
heap
page read and write
1334000
heap
page read and write
52C0000
direct allocation
page execute and read and write
41AE000
stack
page read and write
12B0000
direct allocation
page read and write
4A9F000
stack
page read and write
D84000
heap
page read and write
2A9E000
stack
page read and write
B04000
heap
page read and write
5F3000
stack
page read and write
4C3F000
stack
page read and write
905000
heap
page read and write
856000
heap
page read and write
2E1F000
stack
page read and write
13F0000
heap
page read and write
3DCF000
stack
page read and write
14A6000
heap
page read and write
There are 1500 hidden memdumps, click here to show them.